Shared Flashcard Set

Details

AIS - Chapter 5
Chapter 5 vocabulary
34
Accounting
Undergraduate 3
09/23/2010

Additional Accounting Flashcards

 


 

Cards

Term
sabotage
Definition
the intent to destroy or harm a system or some of its components
Term
white-collar criminals
Definition
typically business people who commit fraud
Term
missappropriation of assets or employee fraud
Definition
theft of company assets
Term
fraudulent financial reporting
Definition
intentional or reckless conduct that results in materially misleading financial statements
Term
Fraud triangle
Definition
Opportunity, Rationalization, Pressure

opportunity - commit, convert, conceal
Term
pressure
Definition
a person's incentive or motivation for committing fraud
Term
computer fraud
Definition
any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution
Term
click fraud
Definition
clicking on ads numerous times to inflate advertising bills
Term
denial of service attack
Definition
sending email bombs from randomly generated false addresses, the recipient's internet service provider email server is overloaded and shuts down
Term
evil twin
Definition
wireless network with the same name as a local wireless access point
Term
hacking
Definition
accessing and using computer systems without permission, usually by means of a personal computer and telecommunications network
Term
hijacking
Definition
gaining control of someone else's computer to carry out illicit activities without the owner's knowledge
Term
identity theft
Definition
assuming someone's identity, usually for economic gain, by illegally obtaining confidential information
Term
key logger
Definition
using spyware to record a user's keystrokes
Term
malware
Definition
software that can be used to do harm
Term
packet sniffing
Definition
using a computer to find confidential information as it travels the internet and other networks
Term
password cracking
Definition
penetrating system defenses, stealing passwords and decrypting them so they can be used to access system programs, files, and data
Term
pharming
Definition
redirecting traffic to a spoofed web site to gain access to personal and confidential information
Term
phishing
Definition
sending emails requesting recipients to visit a web page to verify or fill in missing data.
Term
piggybacking
Definition
1. using someone's wi-fi network for mischief, hacking, etc,
2. tapping into a telecommunications line , latching onto an authorized user and accompanying them into the system
3. bypassing physical security by entering when an authorized person enters
Term
posing
Definition
pretending to be a legitimate business, collecting money and info and never delivering a product
Term
scavenging/dumpster diving
Definition
looking for personal information in the trash or on old hard drives
Term
shoulder surfing
Definition
listening to someone as they give out confidential information to another
Term
skimming
Definition
double-swiping credit cards or swiping a card into a card reader to record the data for later use
Term
spamming
Definition
emailing an unsolicited message to many people at the same time
Term
spyware
Definition
using software to monitor computing habits and send the data to someone else without the computer user's permission
Term
trap door
Definition
entering a system using a back door that bypasses normal system controls
Term
trojan horse
Definition
unauthorized code or virus hiding inside and authorized program
Term
virus
Definition
a segment of code that attaches itself to software, replicates and spreads to other systems or files
Term
vishing
Definition
voice phishing where email recipients are asked to call a phone number where they then divulge personal information
Term
war dialing
Definition
dialing thousands of phone lines searching for idle modems that can be used to enter a system
Term
war driving/rocketing
Definition
looking for unprotected wireless networks using a car or rocket
Term
worm
Definition
program hidden in a host program, copies and actively transmits itself to other systems
Term
zero-day attack
Definition
an attack between the time a new software vulnerability is discovered and a software patch that fixes the problem is released
Supporting users have an ad free experience!